CVE-2024-8926

Updated: 2025-11-10 01:36:42.854569

Description:

In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 8.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Alpine Linux 3.22 php 7.3 8.8 HIGH Not Vulnerable 2026-02-16 14:41:45
Alpine Linux 3.22 php 7.4 8.8 HIGH Not Vulnerable 2026-01-23 13:40:38
Alpine Linux 3.22 php 8.1 8.8 HIGH Already Fixed 2026-02-18 11:30:47
Debian 10 php 8.0 8.8 HIGH Not Vulnerable 2025-09-09 19:27:49
Debian 10 php 5.6 8.8 HIGH Not Vulnerable 2025-09-09 19:28:08
Debian 10 php 7.3 8.8 HIGH Not Vulnerable 2025-09-09 19:27:50
Debian 10 php 8.2 8.8 HIGH Already Fixed 2025-09-04 12:20:54
Debian 10 php 8.1 8.8 HIGH Already Fixed 2025-09-04 12:20:55
Debian 10 php 7.0 8.8 HIGH Not Vulnerable 2025-09-09 19:27:52
Debian 10 php 7.1 8.8 HIGH Not Vulnerable 2025-09-09 19:27:51
Total: 140